Commit graph

1820 commits

Author SHA1 Message Date
Kim Alvefur
73c3ab7888 core.certmanager: Use 'tls_profile' instead of 'tls_preset' to match documentation
Confusion!

Thanks Martin
2022-01-18 11:52:35 +01:00
Kim Alvefur
8edd063114 core.certmanager: Apply TLS preset before global settings (thanks Menel)
Allows overriding settings via the global 'ssl' settings as before.
This order was probably accidental. That said, 'ssl' is a giant footgun
we will want to discourage use of.
2022-01-18 08:04:16 +01:00
Kim Alvefur
3b2c39901a core.certmanager: Disable DANE name checks (not needed for XMPP)
Pending https://github.com/brunoos/luasec/pull/179

Should not be done globally, but rather only for s2sout, but that would
have to be in mod_tls then.
2021-09-16 09:52:51 +02:00
Kim Alvefur
0736ecc63d core.modulemanager: Remove compat for mod_console rename in 0.8
Should no longer be needed, especially since mod_admin_telnet morphed
into mod_admin_shell and mod_admin_socket
2022-01-05 04:04:45 +01:00
Kim Alvefur
f343cf5ba0 core.certmanager: Add curveslist to 'old' Mozilla TLS preset
Unsure if this was overlooked before or a recent addition.

Reproduced the data from JSON file available. Would be nice to have a
tool that does that.
2021-12-26 00:05:16 +01:00
Kim Alvefur
da1bffce1d core.certmanager: Check index for wildcard certs 2021-12-22 15:13:49 +01:00
Jonas Schäfer
7c93370ad5 prosodyctl cert: use the indexing functions for better UX
These provide (a) a way to deal with random assortments of certs
and (b) avoid unnecessary error messages and warnings, according
to #1669 anyway, which this fixes.
2021-12-21 21:20:21 +01:00
Kim Alvefur
46a6dafd28 core.certmanager: Rename preset option to 'tls_preset'
TLS good, SSL bad.
2021-12-22 14:24:26 +01:00
Kim Alvefur
184b0a62cb core.certmanager: Add "legacy" preset for keeping previous default settings
If anyone wants that.
2021-12-22 14:12:10 +01:00
Kim Alvefur
99a73bdcf6 core.certmanager: Add TLS 1.3 cipher suites to Mozilla TLS presets 2021-11-03 12:23:29 +01:00
Kim Alvefur
d2ff803262 core.certmanager: Presets based on Mozilla SSL Configuration Generator
ssl_preset = "modern"
2019-12-22 02:25:37 +01:00
Matthew Wild
bd455426f6 moduleapi: Support stripping of multi-word from module names
The goal is to allow module:provides("foo-bar") with a mod_foo_bar_ prefix
being stripped. It will break any existing modules that use a prefix and have
hyphens instead of underscores. No such modules are known.
2021-12-22 14:40:42 +00:00
Matthew Wild
c482490bff configmanager: Update error message to say 'VirtualHost' instead of 'Host' 2021-12-20 20:46:24 +00:00
Kim Alvefur
e813cdf91b core.modulemanager: Load mod_smacks on Components
Since it applies to s2s on Components as well as on VirtualHosts.
2021-12-20 00:16:22 +01:00
Kim Alvefur
a3c82c5d02 core.usermanager: Implement noop role writes on global authz provider
So that the methods are there and don't cause an error.
2021-12-06 22:38:27 +01:00
Kim Alvefur
8aa16eaec0 mod_cron: Add a 'weekly' job frequency 2021-12-03 09:05:41 +01:00
Kim Alvefur
7f2412db5c core.moduleapi: Add API for adding daily or hourly tasks via mod_cron 2021-11-21 18:13:21 +01:00
Kim Alvefur
1ac4aed7cd mod_admin_shell: List collected metrics in module:info
Lets you know what to look for with stats:show()
2021-11-24 20:03:38 +01:00
Kim Alvefur
2921cef48f core.moduleapi: Fix name of renamed API in log message
hook_stanza was renamed hook_tag in 2012 in 2087d42f1e77
Why do we still have hook_stanza?

Why is this only a warning anyway?
2021-11-18 16:26:54 +01:00
Matthew Wild
30ef01a6cc s2smanager: Fire s2s-destroyed event to mirror s2s-created
The existing events do not fire for unauthed sessions, for example (because
the type does not match). I deemed changing their behaviour too risky, and
the current behaviour may even be more desirable for some uses.

This means we now have roughly paired events:

 - s2s-created -> s2s-destroyed (global only)
 - s2sin-established -> s2sin-destroyed (global + host)
 - s2sout-established -> s2sout-destroyed (global + host)
2021-11-12 13:30:39 +00:00
Matthew Wild
3315a2f616 usermanager: Fire user-roles-changed event when updating roles of a local user 2021-11-12 13:25:09 +00:00
Kim Alvefur
f5ea676b92 core.moduleapi: Ensure module:send_iq() handler priority over mod_iq
To prevent a situation where you for whatever reason use a full JID that
is currently online and the response ends up routed there instead of the
module:send_iq() handlers.
2021-09-24 20:26:21 +02:00
Kim Alvefur
e341f785e6 core.moduleapi: Enable full JID origin queries with module:send_iq()
Since we don't currently have hooks that includes type and id here, we
need to check those attributes in the handlers.
2021-09-24 20:17:31 +02:00
Kim Alvefur
73d7327896 core.moduleapi: Filter out unrelated direct replies to module:send_iq
This is primarily something that happens with an internal query to
mod_mam, which calls origin.send() several times with results, leading
to the first such result being treated as the final response and
resolving the promise.

Now, these responses pass trough to the underlying origin.send(), where
they can be caught. Tricky but not impossible. For remote queries, it's
even trickier, you would likely need to bind a resource or similar.
2021-09-24 20:12:16 +02:00
Matthew Wild
58e6c71f12 usermanager, mod_authz_internal: Add methods to fetch users/JIDs of given role 2021-08-26 16:35:43 +01:00
Kim Alvefur
4d26d4cb15 core.certmanager: Support 'use_dane' setting to enable DANE support
Removes the need to enable DANE with two separate settings.
Previously you had to also set `ssl = { dane = true }` to activate DANE
support in LuaSec and OpenSSL.
2021-07-18 22:46:57 +02:00
Kim Alvefur
31eb61f22a core.loggingmanager: Disable pretty printing when not connected to a tty
Things can behave unexpectedly when fed ANSI escape codes.
2021-07-04 15:11:53 +02:00
Kim Alvefur
bfb4514d0f core.loggingmanager: Pretty-print logged XML snippets in console
This replaces an earlier method in a private extension that logged
pretty-printed XML, which broke due to the escaping added in util.format
2021-06-29 16:07:57 +02:00
Kim Alvefur
417846da58 core.loggingmanager: Support passing log messages trough a filter
This will be used by the console logger for pretty printing.
2021-06-29 16:05:35 +02:00
Kim Alvefur
4c922a6d16 core.stanza_router: Rename variable to be more specific 2021-06-25 15:17:37 +02:00
Kim Alvefur
cf5c477c8f core.portmanager: Also reload per-SNI certificates 2021-06-10 15:33:52 +02:00
Kim Alvefur
b665846031 core.portmanager: Reload direct TLS certificates after config reload
This should re-create all contexts the same way as when the service was
activated, which reloads certificates.
2021-06-10 15:30:54 +02:00
Kim Alvefur
cdb0bff7d2 core.portmanager: Factor out base TLS context creation for reuse
Thinking I can use this to reload certificates after config reload
2021-06-10 15:21:07 +02:00
Kim Alvefur
8df4b320f4 core.certmanager: Skip service certificate lookup for https client
Quick Fix\u{2122} to stop prevent certmanager from automatically adding
a client certificate for net.http.request, since this normally does not
require such.
2021-05-27 09:22:07 +02:00
Kim Alvefur
01c869407d core.portmanager: Fix race condition in initialization of SNI cert map
Under some circumstances when hosts and modules are loaded in some
certain order, entries end up missing from the SNI map. This manifests
in e.g. `curl https://localhost:5281/` giving an error about
"unrecognized name".

The `service` argument is `nil` when invoked from the "host-activated"
event, leading it to iterating over every service. And then it would not
be fetching e.g. `http_host` from the config, which explains why https
would sometimes not work due to the missing name entry.

Because when `service` is included, this limits the iteration to
matching entries, while also returning the same value as the `name` loop
variable.  Because `name == service when service != nil` we can use name
instead in the body of the loop.
2021-05-28 17:09:22 +02:00
Kim Alvefur
4395895fef core.modulemanager: Inherit mod_server_contact_info onto components #1270 2021-05-27 11:18:42 +02:00
Jonas Schäfer
a2fb39c676 statsmanager: remove "legacy" wording
This was a leftover from when we (or rather I) thought that the
old (now called "high-level") API would be removed. We deemed it
useful though, so let's remove that "legacy" language and make
the description more friendly.
2021-05-20 14:03:01 +02:00
Matthew Wild
5bc8b2a379 Merge 0.11->trunk 2021-05-13 11:17:13 +01:00
Kim Alvefur
37ad3b8fb2 core.certmanager: Catch error from lfs
lfs.dir() throws a hard error if there's a problem, e.g. no such
directory or permission issues. This also gets called early enough that
the main loop error protection hasn't been brought up yet, causing a
proper crash.
2021-05-07 16:47:58 +02:00
Kim Alvefur
2c902f163f core.certmanager: Resolve certs path relative to config dir
Otherwise the default "certs" would be relative to $PWD, which works
when testing from a source checkout, but not on installed systems where
it usually points to the data directory.

Also, the LuaFileSystem dir() iterator throws a hard error, which may
cause a crash or other problems.
2021-05-07 16:35:37 +02:00
Kim Alvefur
4cd3fcfb0b core.portmanager: Use existing http_host for https SNI mapping 2021-05-05 17:54:44 +02:00
Kim Alvefur
10fc065796 core.portmanager: Allow overriding expected SNI name per service
E.g.

	VirtualHost"example.com"
	https_name = "xmpp.example.com"
2021-05-05 17:52:51 +02:00
Kim Alvefur
f2a8b90b30 core.certmanager: Skip directly to guessing of key from cert filename
Cuts down on a ton of debug logs
2021-05-05 15:56:39 +02:00
Kim Alvefur
2d707a905f core.certmanager: Join paths with OS-aware util.paths function
Right thing to do, rather than hardcoding '/'
2021-05-05 15:54:05 +02:00
Kim Alvefur
c372b19359 core.certmanager: Build an index over certificates 2021-04-10 14:45:40 +02:00
Kim Alvefur
003e8f633a core.certmanager: Check for complete filename
Prevents a false positive match on files with fullchain.pem as suffix
2021-04-10 14:45:03 +02:00
Jonas Schäfer
5d597837f5 Statistics: Rewrite statistics backends to use OpenMetrics
The metric subsystem of Prosody has had some shortcomings from
the perspective of the current state-of-the-art in metric
observability.

The OpenMetrics standard [0] is a formalization of the data
model (and serialization format) of the well-known and
widely-used Prometheus [1] software stack.

The previous stats subsystem of Prosody did not map well to that
format (see e.g. [2] and [3]); the key reason is that it was
trying to do too much math on its own ([2]) while lacking
first-class support for "families" of metrics ([3]) and
structured metric metadata (despite the `extra` argument to
metrics, there was no standard way of representing common things
like "tags" or "labels").

Even though OpenMetrics has grown from the Prometheus world of
monitoring, it maps well to other popular monitoring stacks
such as:

- InfluxDB (labels can be mapped to tags and fields as necessary)
- Carbon/Graphite (labels can be attached to the metric name with
  dot-separation)
- StatsD (see graphite when assuming that graphite is used as
  backend, which is the default)

The util.statsd module has been ported to use the OpenMetrics
model as a proof of concept. An implementation which exposes
the util.statistics backend data as Prometheus metrics is
ready for publishing in prosody-modules (most likely as
mod_openmetrics_prometheus to avoid breaking existing 0.11
deployments).

At the same time, the previous measure()-based API had one major
advantage: It is really simple and easy to use without requiring
lots of knowledge about OpenMetrics or similar concepts. For that
reason as well as compatibility with existing code, it is preserved
and may even be extended in the future.

However, code relying on the `stats-updated` event as well as
`get_stats` from `statsmanager` will break because the data
model has changed completely; in case of `stats-updated`, the
code will simply not run (as the event was renamed in order
to avoid conflicts); the `get_stats` function has been removed
completely (so it will cause a traceback when it is attempted
to be used).

Note that the measure_*_event methods have been removed from
the module API. I was unable to find any uses or documentation
and thus deemed they should not be ported. Re-implementation is
possible when necessary.

   [0]: https://openmetrics.io/
   [1]: https://prometheus.io/
   [2]: #959
   [3]: #960
2021-04-18 11:47:41 +02:00
Kim Alvefur
1e3a250929 core.sessionmanager: Add a dummy rawsend() method to resting sessions
Should fix a traceback on attempted use after destruction, in case where
opportunistic_writes was in use.

Thanks Ge0rG
2021-04-15 15:12:35 +02:00
Kim Alvefur
19746da12f core.statsmanager: Allow special "manual" value for statistics_interval
When set, no periodic statistics collection is done by
core.statsmanager, instead some module is expected to call collect()
when it suits. Obviously only one such module should be enabled.

Quoth jonas’
> correct way is to scrape the internal sources on each call to /metrics
> in the context of Prometheus

"manual" as opposed to "automatic", from the point of view of
statsmanager.
2021-04-06 23:25:15 +02:00
Kim Alvefur
490980289f core.statsmanager: Cover util.statistics work in processing measurement
Zash> Btw, this conditional and loop, shouldn't it be covered by the timing measurement?
Zash> Isn't that where all the util.statistics work is done?
MattJ> Yeah, it should
Zash> ("the", but there's two ... which one‽)
MattJ> Yeah... not sure :)
MattJ> Processing I guess
2021-04-06 23:23:28 +02:00